Associate Professor of Immunology & Infection / Director of Research, School of Applied Sciences
Lecturer and Research Leader in Biomedical Sciences
Business Development Executive
Ma, F., Liu, X., Yang, Y., Yao, W., Cai, J., & Wang, F. (2017). ESBSC: Energy-Aware Service Brokering Strategy in Clouds. In Proceedings of the IEEE 41st Annual Computer Software and Applications Conference (COMPSAC)doi:10.1109/compsac.2017.120
One of the key features of cloud computing is on demand resource provision. Unfortunately, different cloud service providers often have different standards, which makes the jo...
Nagar, U., Nanda, P., He, X., & Tan, Z. (2017). A framework for data security in the cloud using Collaborative Intrusion Detection scheme. In Proceedings of 10th International Conference On Security Of Information And Networks, 7
Cloud computing offers an on demand, elastic, global network access to a shared pool of resources that can be configured on user demand. It offers a unique pay-as-you go featu...
O 'Dowd, A. (2017). SKiN Designing pseudo-physiology into personal technology devices to create enhanced interactions through visceral signifiers and behaviours
The majority of technology is now personal. Humans, in turn, are expected to and have personal relationships with their devices. The issue is that humans are biological beings...
A pump-priming proposal designed to investigate the potential for LL-37, a human cationic host defence peptide, to inhibit Rhinovirus infection and/or target cells infected with Rhinovirus for inducti...
Chief Scientists Office
We have identified the human cathelicidn LL-37 as having potent direct antiviral activity against human rhinovirus (HRV), together with the capacity to alter death pathways in HRV-infected cells, as a...
Crohn's in Childhood Research Association
Recent genetic discoveries, principally identification of NOD2 and ATG16L1 as susceptibility loci, strongly implicate a dysregulated host response to enteric bacteria and the autophagy pathway in the ...
19 December 2016
The world is moving towards Big Data, and with Cyber Security we see the tracking of host and network events as one of its leading applications. Threats to organisations incre...
20 June 2017
Professor Bill Buchanan was invited to present evidence to the Health and Social Care Committee on Cyber Security risks within Health Care in Scotland. He gave evidence on 20 ...
08 February 2017
Associate Professor of audio Engineering
Director of Sustainable Construction
Lecturer in Contemporary Literature and Culture
Assistant Principal, Student Experience
Romdhani, I., Nabil, D., Medjek, F. & Tandjaoui, D. (in press). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. In Proceedings of the Thirteenth International Conference on Wireless and Mobile CommunicationsISBN na
The vulnerability of IoT networks makes channel
access security a serious problem. The IEEE 802.15.4 MAC
(Media Access Control) layer faces the risk of attacks from
Baudel, M., Rae, M., Fraser, J. & Poole, A. (2017). The expression of the chloride co-transporters NKCC1 and KCC2 is reversed in the penumbra following. In Brain and Neuroscience: BNA 2017 Festival of Neuroscience: Abstract BookISBN n/a
Stroke is one of the major causes of death and disability worldwide. The harm caused by the interruption of blood flow to the brain
unfolds in the subsequent hours and days, s...
Xie, Y. H., Yang, Z. X. & Barreto, D. (2016). The Influence of Particles’ Aspect Ratio on the Shear Behaviour of Granular Materials. In Springer Proceedings in Physics; Proceedings of the 7th International Conference on Discrete Element Methods, 253-264. doi:10.1007/978-981-10-1926-5_29. ISBN 978-981-10-1925-8; 978-981-10-1926-5
The mechanical response of granular material depends both on the material properties (e.g. stiffness, anisotropy, permeability, etc.) and particle geometry (shape, roughness, ...
Buchanan, W. J. & Van Deursen, N. (2016). HI-risk: A Method to Analyse Health Information Risk Intelligence. In 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom)doi:10.1109/HealthCom.2016.7749536. ISBN 978-1-5090-3370-6
— Information security threat intelligence is a prevalent topic amongst researchers, long-established IT-vendors and start-ups. The possibilities of Big Data analytics to secu...
Binyamin, S., Smith, S. & Rutter, M. (2016). Evaluating the Usability of Learning Management Systems from Students' Perception: A Case Study of King Abdulaziz University. In 15th European Conference on eLearning (ECEL 2016), 112 - 113. ISBN 978-1-911218-18-0
Abstract: Due to the rapid improvement in Information and Communication Technology (ICT), adopting technologies has become a major focus of interest in the field of education....
Marinelli, A. (2016). A combined experimental and numerical study of the pull-out mechanism of threaded titanium bars embedded in marble blocks. In The ECCOMAS Congress 2016 Proceedings, 5207-5218. ISBN 978-618-82844-0-1
The present study describes the first stage of an ongoing research project aiming to investigate the failure mechanisms activated when reinforcing bars are pulled-out from the...
Anastasiadou, C. (in press). It’s all Greek to me”: Stakeholder Perspectives on Scotland’s Reformed Tourism Structures
Processes of territorialisation, devolution and rescaling within Europe are creating spatially redefined destinations that are giving rise to novel and distinctive tourism str...
Li, M., Zhang, H. & Wong, S. H. F. (2016). Using topology optimization technique to determine the optimized layout of steel reinforcing bars in concrete structures. In Herskovits, J. (Ed.). Proceedings of 5th International Conference on Engineering Optimization, 789-798. ISBN 978-85-7650-548-8
1. Abstract This study presents an optimization procedure based on the modified Bi-directional evolutionary structural optimization (BESO) approach to optimize both location a...
Heenan, R. & Moradpoor, N. (2016). A survey of Intrusion Detection System technologies
– This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the perfor...
Nadimi, S., Fonseca, J., Taylor, R. N. & Barreto, D. (2016). Revisiting the particle size effects in centrifuge modelling. In Escoffier, S., Blanc, M., Bretschneider, A. & Thorel, L. (Eds.). EUROFUGE 2016, 3rd European conference on Physical Modelling in Geotechnics, 85-90. ISBN 978-2-85782-716-0, 978-2-85782-717-7
Geotechnical centrifuge modelling provides an opportunity to examine novel and complex events in a well-controlled and repeatable environment. While grain interaction and cont...
James, K. & Fortheringham, J. (2016). Higher Education Sector Engagement with Higher Education Academy Fellowship. In Converging Concepts in Global Higher Education Research: Local, national and international Perspectives
Considering a historical perspective that looks briefly at higher education changes influenced by government ideological direction is useful for understanding higher education...
Molla, R., Romdhani, I. & Buchanan, B. (2015). 3LS-authenticate: an e-commerce challenge-response mobile application.
The proposed research is a direct response to the European Commission's Active and Healthy Ageing initiative, with an
overarching goal to improve the quality of life of older people. By pursuing 15 di...
Scottish Institute for Policing Research
The aim of the project is to conduct a systematic review and host round-table discussions to explore the use of police discretion when making decisions in relation to individuals' vulnerability.
British Association of Sport and Exercise Sciences
The project will measure circulating white blood cells and progenitor cells in response to an extreme exercise running bout/event/ We will also be quantifying upper respiratory tract symptoms.
Chlamydia trachomatis is the most common sexually transmitted infection in Scotland, and has significant long‐term consequences to reproductive health. Recent studies suggest that in addition to the g...
Morgan Stanley is seeking a data science resource / support to augment its Technology Information Risk Team within the Technology and Data division. The key challenge involves an investigation of the ...
This European Fellowship project will benefit the researcher by giving and enhancing the knowledge and skills for a future generation of CPSs which enjoy the unique feature of context-active resilienc...
Construction Scotland Innovation Centre
Given the knowledge, infrastructure and resource that resides within Scotland, there is a real opportunity here to be a key player in the global offsite construction market. The emphasis now is to sca...
Society of Applied Microbiology
Salmonella enterica is a leading cause of foodborne infection with a recent increase in the number of antibiotic resistant isolates. We propose a biotechnological approach to the development of novel ...
Carnegie Trust for the Universities of Scotland
The study has a health focus with the results aiming to reduce the likelihood of overuse injuries. It will examine the effects if load carried and action response when experienced participants are ask...
Creating antibodies as new tools to investigate the cell sugar transporters that are unregulated in cancer and infection
Characterisation of bacteriophage E3 endolysin as antimicrobial against R. equi infections
RS Macdonald Charitable Trust
Ovine prenatal steriod exposure: a new model for neuropsychiatric disorders
The PhD project which I am undertaking is focused on understanding the role of cathelicidins during respiratory viral infec...
Alpha-1-acid glycoprotein (AGP) is a 43kDa glycoprotein, so called due to the post-translation...
Proteolytic degradation of the extracellular matrix (ECM...
The topic Addresses the development of novel secrity echanisms for mobile ad hoc networks, inspired by mechanisms apparent in the biological...
This PhD project is to investigate the physiological demands of elite enduro mountain bike racing. Previou...
On 30th November 2016 Edinburgh Napier University hosted the 2016 Annual Lecture of the Association for Information Science and Technology (ASIST). The speaker was Professor S...
01 June 2017
It is established that there are recognition rate limitations when using a single modality sensor to perform human action or gesture recognition for human-comp...
01 April 2016
Michael J Driscol from the FBI will present the end note talk at Big Data in Cyber Security conference on 10 May 2016. He will join leading speakers, including from HPE, RSA, ...
05 March 2016
05 March 2016
to Conference at the School of Communication, Manipal University, India
17 June 2016
17 June 2016
Professor Chandra Bhat Director of the Centre for Transportation Research, The University of Texas at Austin visited TRI at Edinburgh Napier University to discuss joint collab...
30 November 2017
30 November 2017
Following the success of her site-specific composition for Craigsbank Parish Church, presented on September 23rd 2017 as part of Edinburgh Doors open Day, Katrina has been inv...
17 November 2017
19 November 2017
Brightlight was the first major study of its kind on specialist cancer care in England for young people. Its findings and young patients’ perspectives combine to inspire this ...
17 February 2016
17 February 2016
Stevie Wilson will provide a key talk at the International Conference on Big Data in Cyber Security on 10 May in Edinburgh.
Steve is currently the Head of Europol’s Euro...